Sciweavers

1316 search results - page 117 / 264
» A Computational Approach to Compare Information Revelation P...
Sort
View
CVPR
2006
IEEE
14 years 11 months ago
Improving Recognition of Novel Input with Similarity
Many sources of information relevant to computer vision and machine learning tasks are often underused. One example is the similarity between the elements from a novel source, suc...
Jerod J. Weinman, Erik G. Learned-Miller
FPL
2003
Springer
130views Hardware» more  FPL 2003»
14 years 2 months ago
A Smith-Waterman Systolic Cell
With an aim to understand the information encoded by DNA sequences, databases containing large amount of DNA sequence information are frequently compared and searched for matching ...
Chi Wai Yu, K. H. Kwong, Kin-Hong Lee, Philip Heng...
ECAI
2006
Springer
14 years 23 days ago
Identifying Inter-Domain Similarities Through Content-Based Analysis of Hierarchical Web-Directories
Providing accurate personalized information services to the users requires knowing their interests and needs, as defined by their User Models (UMs). Since the quality of the person...
Shlomo Berkovsky, Dan Goldwasser, Tsvi Kuflik, Fra...
SCCC
2000
IEEE
14 years 1 months ago
A Genetic Classifier Tool
Knowledge discovery is the most desirable end product of an enterprise information system. Researches from different areas recognize that a new generation of intelligent tools for...
Aurora T. R. Pozo, Mozart Hasse
WISEC
2010
ACM
13 years 9 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig